Jeff Mitchell
f3ef23318d
Create more granular ACL capabilities.
...
This commit splits ACL policies into more fine-grained capabilities.
This both drastically simplifies the checking code and makes it possible
to support needed workflows that are not possible with the previous
method. It is backwards compatible; policies containing a "policy"
string are simply converted to a set of capabilities matching previous
behavior.
Fixes #724 (and others).
2016-01-08 13:05:14 -05:00
Jeff Mitchell
d7f528a768
Add reset support to the unseal command.
...
Reset clears the provided unseal keys, allowing the process to be begun
again. Includes documentation and unit test changes.
Fixes #695
2015-10-28 15:59:39 -04:00
Jeff Mitchell
f1a301922d
Remove cookie authentication.
2015-08-21 19:46:23 -07:00
Mitchell Hashimoto
d666e79a3a
http: /sys/seal requires a token
2015-03-31 11:45:44 -07:00
Mitchell Hashimoto
d93bdacbbd
vault: require root token for seal
2015-03-31 09:59:02 -07:00
Mitchell Hashimoto
e657ac8b52
http: /sys/seal-status should return 400 if still uninitialized
2015-03-30 23:36:03 -07:00
Armon Dadgar
06e30b425e
Fixing compilation errors due to API change
2015-03-24 16:20:05 -07:00
Mitchell Hashimoto
2d92c2ee10
fix all tests
2015-03-15 17:10:33 -07:00
Mitchell Hashimoto
48c05995e5
http: make TestServer public
2015-03-13 12:53:09 -07:00
Mitchell Hashimoto
d2642529b7
vault: public testing methods
2015-03-13 12:53:09 -07:00
Mitchell Hashimoto
e3fbe54a04
http: mask user error away from unseal since its not actionable
2015-03-12 11:26:59 -07:00
Mitchell Hashimoto
d564131cef
http: test all seal endpoints
2015-03-12 11:12:44 -07:00
Mitchell Hashimoto
549631a896
http: prefix with v1
2015-03-12 10:47:31 -07:00
Mitchell Hashimoto
1115518349
http: tests
2015-03-12 10:46:45 -07:00